通知公告
访问统计

总访问量

今日访问

在线人数

下载排行

    一年内发表文章 | 两年内 | 三年内 | 全部 | 最近1个月下载排行 | 最近1年下载排行

    当前位置: 全部
    Please wait a minute...
    选择: 显示/隐藏图片
    1. Remaining useful life prediction of lithium-ion batteries using a fusion method based on Wasserstein GAN
    周温丁 鲍士兼 许方敏 赵成林
    中国邮电高校学报(英文版)    2020, 27 (1): 1-9.   DOI: 10.19682/j.cnki.1005-8885.2020.0004
    摘要2643)      PDF(pc) (1567KB)(10485)    收藏
    Lithium-ion batteries are the main power supply equipment in many fields due to their advantages of no memory, high energy density, long cycle life and no pollution to the environment. Accurate prediction for the remaining useful life (RUL) of lithium-ion batteries can avoid serious economic and safety problems such as spontaneous combustion. At present, most of the RUL prediction studies ignore the lithium-ion battery capacity recovery phenomenon caused by the rest time between the charge and discharge cycles. In this paper, a fusion method based on Wasserstein generative adversarial network (GAN) is proposed. This method achieves a more reliable and accurate RUL prediction of lithium-ion batteries by combining the artificial neural network (ANN) model which takes the rest time between battery charging cycles into account and the empirical degradation models which provide the correct degradation trend. The weight of each model is calculated by the discriminator in the Wasserstein GAN model. Four data sets of lithium-ion battery provided by the National Aeronautics and Space Administration (NASA) Ames Research Center are used to prove the feasibility and accuracy of the proposed method.
    参考文献 | 相关文章 | 多维度评价
    2. IDL: Evaluating software quality based on PageRank algorithm
    周国强, 范译, ZHANG Shuai WANG Yilun DAI Gui-lan
    中国邮电高校学报(英文版)    2020, 27 (1): 10-25.   DOI: 10.19682/j.cnki.1005-8885.2020.0006
    摘要1165)      PDF(pc) (1660KB)(3942)    收藏
    In the traditional method, the software quality is measured by various metrics of the software, such as decoupling level (DL), which can be used to predict software defect. However, DL, which treats all the ?les equally, has not taken file importance into consideration. Therefore, a novel software quality metric, named as improved decoupling level (IDL), based on the importance of documents was proposed. First, the PageRank algorithm was used to calculate the importance of ?les to obtain the weights of the dependencies, and then defect prediction models was established by combining the software scale, dependencies, scores and software defects to assess the software quality. Compared to most existing module-based software quality evaluation methods, IDL has similar or even superior performance in the prediction of software quality. The results indicate that IDL measures the importance of each ?le in the software more accurately by combining the PageRank algorithm in DL, which indirectly re?ects the quality of software by predicting the bug information in software and improves the accuracy of prediction result of software bug information.
    参考文献 | 相关文章 | 多维度评价
    3. Dense small cell clustering based on undirected weighted graph for local mobility management
    李营营 马忠贵 刘立宇 闫文博
    中国邮电高校学报(英文版)    2016, 23 (5): 32-39.   DOI: 10.1016/S1005-8885(16)60055-9
    摘要2728)      PDF(pc) (830KB)(2566)    收藏
    The concept of dense small cell has been recently emerged as a promising architecture that can signi?cantly improve spectrum efficiency and system capacity. However, it brings frequent handover for user equipment (UE). Furthermore, this will bring a great deal of signaling overhead to the core network. Virtual technology has been received widespread attention for solving this problem. Its essence is to form virtual cells by clustering various terminals properly. The local mobility management proposed recently is based on the virtual technology. Therefore, the formation process of virtual cells is the basis for the research in local mobility management. So clustering scheme for dense small cell network has been studied in this paper, and a maximum benefit merging algorithm based on undirected weighted graph has been proposed. There are X2 interfaces between the cluster head and each of cluster members within the same cluster. The cluster heads manage the handover among cluster members acting as the local anchors. The proposed clustering scheme is useful for local mobility management. The simulation results show that the proposed clustering algorithm can decrease the signaling overhead more than 70% and 20% compared with the non-clustering algorithm and other clustering algorithms respectively.
    参考文献 | 相关文章 | 多维度评价
    4. Mobile node aware opportunistic routing in dynamic wireless sensor network
    吕晓军 贾新春 韩宗源 杨波 郝军
    中国邮电高校学报(英文版)    2016, 23 (5): 15-25.   DOI: 10.1016/S1005-8885(16)60053-5
    摘要4054)      PDF(pc) (1457KB)(2558)    收藏
    Opportunistic routing (OR) could adapt to dynamic wireless sensor networks (WSNs) because of its inherent broadcast nature. Most of the existing OR protocols focus on the variations of propagation environment which are caused by channel fading. However, a few works deal with the dynamic scenario with mobile nodes. In this paper, a mobile node (MN) aware OR (MN-OR) is proposed and applied to a WSN in the high-speed railway scenario where the destination node is deployed inside a high speed moving train, and the MN-OR not only considers the mobility of node but also utilizes the candidate waiting time induced by the timer-based coordination scheme. Specifically, to reduce the number of duplicate transmissions and mitigate the delay of information transmission, a new selection strategy of the candidate forwarders is presented. In addition, two priority assignment methods of the candidate forwarders are proposed for the general relay nodes (GRNs) and the rail-side nodes (RSNs) according to their different routing requirements. Extensive simulation results demonstrate that the proposed MN-OR protocol can achieve better network performances compared with some existing routing schemes such as the well-known Ad-hoc on-demand distance vector routing (AODV) and the extremely opportunistic routing (ExOR) protocols.
    参考文献 | 相关文章 | 多维度评价
    5. Analysis of 3D NAND technologies and comparison between charge-trap-based and floating-gate-based flash devices
    刘世军 邹雪城
    中国邮电高校学报(英文版)    2017, 24 (3): 75-82.   DOI: 10.1016/S1005-8885(17)60214-0
    摘要1029)      PDF(pc) (1498KB)(2385)    收藏
    NAND flash chips have been innovated from two-dimension (2D) design which is based on planar NAND cells to three-dimension (3D) design which is based on vertical NAND cells. Two types of NAND flash technologies–charge-trap (CT) and floating-gate (FG) are presented in this paper to introduce NAND flash designs in detail. The physical characteristics of CT-based and FG-based 3D NAND flashes are analyzed. Moreover, the advantages and disadvantages of these two technologies in architecture, manufacture, interference and reliability are studied and compared.
    参考文献 | 相关文章 | 多维度评价
    6. Research on intelligent fault diagnosis based on time series analysis algorithm
    陈刚;刘洋;周文安;宋俊德
    Acta Metallurgica Sinica(English letters)    2008, 15 (1): 68-74.   DOI: 1005-8885 (2008) 01-0068-07
    摘要2567)      PDF(pc) (416KB)(1553)    收藏

    Aiming to realize fast and accurate fault diagnosis in complex network environment, this article proposes a set of anomaly detection algorithm and intelligent fault diagnosis model. Firstly, a novel anomaly detection algorithm based on time series analysis is put forward to improve the generalized likelihood ratio (GLR) test, and thus, detection accuracy is enhanced and the algorithm complexity is reduced. Secondly, the intelligent fault diagnosis model is established by introducing neural network technology, and thereby, the anomaly information of each node in end-to-end network is integrated and processed in parallel to intelligently diagnose the fault cause. Finally, server backup solution in enterprise information network is taken as the simulation scenario. The results demonstrate that the proposed method can not only detect fault occurrence in time, but can also implement online diagnosis for fault cause, and thus, real-time and intelligent fault management process is achieved.

    参考文献 | 相关文章 | 多维度评价
    7. Novel high-PSRR high-order curvature-compensated bandgap voltage reference
    周前能 闫凯 林金朝 庞宇 李国权 罗伟
    中国邮电高校学报(英文版)    2016, 23 (2): 66-72.  
    摘要1995)      PDF(pc) (452KB)(1437)    收藏

    This paper proposes a novel high-power supply rejection ratio (high-PSRR) high-order curvature-compensated CMOS bandgap voltage reference (BGR) in SMIC 0.18 μm CMOS process. Three kinds of current are added to a conventional BGR in order to improve the temperature drift within wider temperature range, which include a piecewise-curvature- corrected current in high temperature range, a piecewise-curvature-corrected current in low temperature range and a proportional-to-absolute-temperature current. The high-PSRR characteristic of the proposed BGR is achieved by adopting the technique of pre-regulator. Simulation results shows that the temperature coefficient of the proposed BGR with pre-regulator is /°C from 55 °C to 125 °C with a 1.8 V power supply voltage. The proposed BGR with pre-regulator achieves PSRR of 123.51 dB, 123.52 dB, 88.5 dB and 50.23 dB at 1 Hz, 100 Hz, 100 kHz and 1 MHz respectively.

    参考文献 | 相关文章 | 多维度评价
    8. Fog computing for vehicular Ad-hoc networks: paradigms, scenarios, and issues
    康慨 王枞 LuoTao
    中国邮电高校学报(英文版)    2016, 23 (2): 56-65.  
    摘要1900)      PDF(pc) (2445KB)(1422)    收藏
    Vehicular Ad-hoc networks (VANETs) are kinds of mobile Ad-hoc networks (MANETs), which consist of mobile vehicles with on-board units (OBUs) and roadside units (RSUs). With the rapid development of computation and communication technologies, peripheral or incremental changes in VANETs evolve into a revolution in process. Cloud computing as a solution has been deployed to satisfy vehicles in VANETs which are expected to require resources (such as computing, storage and networking). Recently, with special requirements of mobility, location awareness, and low latency, there has been growing interest in research into the role of fog computing in VANETs. The merging of fog computing with VANETs opens an area of possibilities for applications and services on the edge of the cloud computing. Fog computing deploys highly virtualized computing and communication facilities at the proximity of mobile vehicles in VANET. Mobile vehicles in VANET can also demand services of low-latency and short-distance local connections via fog computing. This paper presents the current state of the research and future perspectives of fog computing in VANETs. Moreover, we discuss the characteristics of fog computing and services based on fog computing platform provided for VANETs. In this paper, some opportunities for challenges and issues are mentioned, related techniques that need to be considered have been discussed in the context of fog computing in VANETs. Finally, we discuss about research directions of potential future work for fog computing in VANETs. Within this article, readers can have a more thorough understanding of fog computing for VANETs and the trends in this domain.
    参考文献 | 相关文章 | 多维度评价
    9. Construction of authentication codes with distrust arbitration from polynomials over finite fields
    Chen Shangdi, Tian Wenjing, Li Xue
    中国邮电高校学报(英文版)    2017, 24 (1): 87-95.   DOI: 10.1016/S1005-8885(17)60191-2
    摘要1875)      PDF(pc) (292KB)(1214)    收藏
    The authentication codes with arbitration are able to solve dispute between the sender and the receiver. The authentication codes with trusted arbitration are called , the authentication codes with distrust arbitration are called . As an expansion of , an is an authentication system which is closer to the reality environment. Therefore, have more extensive application value. In this paper, we construct a class of based on polynomials over finite fields, give the parameters of the constructed codes, and calculate a variety of cheating attacks the maximum probabilities of success. Especially, in a special case, the constructed are perfect. Compared with a known type of codes, they have almost the same security level, however, our codes need less storage requirements. Therefore, our codes have more advantages.
    参考文献 | 相关文章 | 多维度评价
    10. Fine-grained analysis of cellular smartphone usage characteristics based on massive network traffic
    Gui Xiaolin, Liu Jun, Li Chenyu, Lü Qiujian, Lei Zhenming
    中国邮电高校学报(英文版)    2016, 23 (3): 70-75.  
    摘要3495)      PDF(pc) (1648KB)(1210)    收藏

    智能手机用户的增长导致移动网络流量爆炸式的增长。理解移动网络流量的特征对于运营商网络资源的优化很重要。本文从手机操作及手机生产厂商的维度对蜂窝网络中的HTTP流量特征进行了细致的分析。首先,我们提出了基于概率的方法来识别安装在每一台智能手机中的操作系统。然后,基于一个持续了31天的数据(一个计费周期),我们从操作系统及手机生产厂商维度对智能手机的流量特征进行分析。最后,我们识别每一台手机中安装的应用,并且从操作系统及手机生产厂商维度比较了应用使用特征。我们的研究为运营商对蜂窝数据网络制定通信资费以及资源分配提供了参考。

    相关文章 | 多维度评价
    11. Mining microblog user interests based on TextRank with TF-IDF factor
    屠守中 黄民烈
    中国邮电高校学报(英文版)    2016, 23 (5): 40-46.   DOI: 10.1016/S1005-8885(16)60056-0
    摘要3653)      PDF(pc) (1273KB)(1166)    收藏
    It is of great value and significance to model the interests of microblog user in terms of business and sociology. This paper presents a framework for mining and analyzing personal interests from microblog text with a new algorithm which integrates term frequency-inverse document frequency (TF-IDF) with TextRank. Firstly, we build a three-tier category system of user interest based on Wikipedia. In order to obtain the keywords of interest, we preprocess the posts, comments and reposts in different categories to select the keywords which appear both in the category system and microblogs. We then assign weight to each category and calculate the weight of keyword to get TF-IDF factors. Finally we score the ranking of each keyword by the TextRank algorithm with TF-IDF factors. Experiments on real Sina microblog data demonstrate that the precision of our approach significantly outperforms other existing methods.
    参考文献 | 相关文章 | 多维度评价
    12. EVM simulation and analysis in digital transmitter
    谭晓衡,李腾蛟
    Acta Metallurgica Sinica(English letters)    2009, 16 (6): 43-48.   DOI: 10.1016/S1005-8885(08)60287-3
    摘要2841)      PDF(pc) (311KB)(1095)    收藏

    The error vector magnitude (EVM) is extensively applied as a metric for digital transmitter signal quality compliance in modern communication systems. This article is focused on the effects of local oscillator (LO) phase noise and nonlinear distortion of power amplifier on EVM. This article contributes to below aspects. First, the relationships between EVM and two effects, LO phase noise and nonlinear distortion of power amplifier, are derived and expressed. Second, to simplify the expression, the third-order intermodulation distortion (IMD3) is used to calculate the EVM. Then, an expression for the EVM is derived based on the digital transmitter model that considers local oscillator phase noise and nonlinear distortion of power amplifier. Finally, the math formula of bit error rate (BER) versus EVM is given which can be easier and more useful to predict BER, according to analysis of the relationship between EVM and signal to noise rate (SNR), inspired by the works of Rishad, Md. Shahriar and AHM, 2006. Simulations are carried out to display the performance of EVM based on these relationships.

    参考文献 | 相关文章 | 多维度评价
    13. Autonomous parking control for intelligent vehicles based on a novel algorithm
    高洪波 XieGuotao 张新钰 ChengBo
    中国邮电高校学报(英文版)    2017, 24 (4): 51-56.   DOI: 10.1016/S1005-8885(17)60223-1
    摘要1616)      PDF(pc) (932KB)(1095)    收藏
    Along with the increasing number of vehicles, parking space becomes narrow gradually, safety parking puts forward higher requirements on the driver’s driving technology. How to safely, quickly and accurately park the vehiclo to parking space right? This paper presents an automatic parking scheme based on trajectory planning, which analyzing the mechanical model of the vehicle, establishing vehicle steering model and parking model, coming to the conclusion that it is the turning radius is independent of the vehicle speed at low speed. The Matlab simulation environment verifies the correctness and effectiveness of the proposed algorithm for parking. A class of the automatic parking problem of intelligent vehicles is solved.
    参考文献 | 相关文章 | 多维度评价
    14. Measuring web page complexity by analyzing TCP flows and HTTP headers
    Cheng Weiqing,Hu Yangyang, Yin Qiaofeng, Chen Jiajia
    中国邮电高校学报(英文版)    2017, 24 (6): 1-13.   DOI: 10.1016/S1005-8885(17)60237-1
    摘要1453)      PDF(pc) (365KB)(1092)    收藏
    To understand website complexity deeply, a web page complexity measurement system is developed. The system measures the complexity of a web page at two levels: transport-level and content-level, using a packet trace-based approach rather than server or client logs. Packet traces surpass others in the amount of information contained. Quantitative analyses show that different categories of web pages have different complexity characteristics. Experimental results show that a news web page usually loads much more elements at more accessing levels from much more web servers within diverse administrative domains over much more concurrent transmission control protocol (TCP) flows. About more than half of education pages each only involve a few logical servers, where most of elements of a web page are fetched only from one or two logical servers. The number of content types for web game traffic after login is usually least. The system can help web page designers to design more efficient web pages, and help researchers or Internet users to know communication details.
    参考文献 | 相关文章 | 多维度评价
    15. LPC parameters substitution for speech information hiding
    吴志军,高伟,杨伟
    Acta Metallurgica Sinica(English letters)    2009, 16 (6): 103-112.   DOI: 10.1016/S1005-8885(08)60295-2
    摘要2993)      PDF(pc) (458KB)(1057)    收藏

    Information hiding techniques adopted in secret communication should meet the requirements of high hiding capacity, real-time and high robustness. For the purpose of real-time speech secure communication, an information hiding algorithm based on the analysis-by-synthesis (ABS) speech coding scheme is presented in this article. This algorithm substitutes secret speech data bits for linear predictive coefficients (LPCs) in linear predictive coding (LPC). Statistics show that the change of voiced signal track is slow and the codebook for LPCs vector is large in ABS coding scheme. Therefore, a new concept, filter similarity, is proposed to determine the LPC parameters for substituting with secret speech information, and to generate multi-codebook for saving storage space to store secret speech information. To achieve the best effects of information hiding, a dynamic threshold is built to make an optimal trade-off among hiding-capacity, security, robustness, transparence and real time. Experiments show that the proposed approach meets the requirements of information hiding and secret communication speech quality. The test results indicate that this approach reaches high hiding capacity with an excellent speech quality and complicating speakers’ recognition.

    参考文献 | 相关文章 | 多维度评价
    16. Design of hexagon microstrip antenna for vehicle-to-vehicle communication
    郝宏刚 李佳玉 Huang Daili Luo Wei
    中国邮电高校学报(英文版)    2016, 23 (4): 69-76.   DOI: 10.1016/S1005-8885(16)60047-X
    摘要4463)      PDF(pc) (2265KB)(936)    收藏
    Considering the shortcomings of the existing vehicle-to-vehicle (V2V) communication antennas, this paper proposes a regular hexagon broadband microstrip antenna. By loading shorting pins and etching V-shape slots with different size at each angle of the regular hexagon patch, it realizes impedance matching and obtains better impedance bandwidth. The simulated results show that the relative bandwidth of this antenna reaches 35.55%, covers the frequency band of 4.74 GHz to 6.79 GHz. The antenna acquires an omni-directional radiation pattern in the horizontal plane whose out of roundness is less than 0.5 dB. In addition, the antenna is manufactured and tested, whose tested results are basically consistent with simulated results. Because the height of antenna is 3 mm, it is easy to be hidden on roof of a vehicle for V2V communication.
    参考文献 | 相关文章 | 多维度评价
    17. Non-orthogonal pilot pattern for sparse channel estimation in large-scale MIMO-OFDM system
    徐超 张建华 尹长川
    中国邮电高校学报(英文版)    2016, 23 (4): 63-68.   DOI: 10.1016/S1005-8885(16)60046-8
    摘要4383)      PDF(pc) (540KB)(931)    收藏
    From the perspective of compressed sensing (CS) theory, the channel estimation problem in large-scale multiple input multiple output (MIMO)-orthogonal frequency division multiplexing (OFDM) system is investigated. According to the theory, the smaller mutual coherence the reconstruction matrix has, the higher success probability the estimation can obtain. Aiming to design a pilot that can make the system reconstruction matrix having the smallest mutual coherence, this paper proposes a low complexity joint algorithm and obtains a kind of non-orthogonal pilot pattern. Simulation results show that compared with the conventional orthogonal pilot pattern, applying the proposed pattern in the CS channel estimation can obtain the better normalized mean square error performance. Moreover, the bit error rate performance of the large-scale MIMO-OFDM system is also improved.
    参考文献 | 相关文章 | 多维度评价
    18. Reduced frame set on wireless distorted video for quality assessment
    邵华 温向明 路兆铭 陈亚文 陆镜宇
    中国邮电高校学报(英文版)    2016, 23 (4): 77-82.   DOI: 10.1016/S1005-8885(16)60048-1
    摘要4768)      PDF(pc) (629KB)(918)    收藏
    Objective video quality assessment methods often evaluate all the frames regardless of their importance. For wireless distorted videos, not every frame has the same contribution to the final overall quality due to the channel fading and interference, which may lead to the capacity variation in temporal. Besides, with the content similarity and error propagation pattern in temporal domain, it is possible to evaluate the overall quality with only part of the frames. In this paper, a demonstration is performed to show that the video quality can be evaluated with reduced frames set (RFS), and a state transition model is proposed to extract the RFS. At last, a video quality assessment (VQA) method is carried out based on RFS. Compared with several state-of-the-art methods, our method can achieve a suitable accuracy with less frames to be processed.
    参考文献 | 相关文章 | 多维度评价
    19. Resource Allocation Scheme Based on Game Theory in Heterogeneous Networks
    Wu Yalong, Li Xi, Zhang Heli, Wang Ke
    中国邮电高校学报(英文版)    2016, 23 (3): 57-62.  
    摘要3741)      PDF(pc) (778KB)(852)    收藏

    As an effective solution for indoor coverage and service offloading from the conventional cellular networks, femtocells have attracted a lot of attention in recent years. This study investigates the resource block (RB) and power allocation in heterogeneous network. Specifically, the concern here is to maximize the signal-to-interference-plus- noise-ratio (SINR) of macrocell and energy efficiency of femtocell while providing the finite interference. In this paper, the network model is divided into two layers, in which the macro base station and clusters constitute the first layer network; femtocells inside cluster make up the second layer. Because of the different model structure, different game theory is used in each layer. Stackelberg Game is used in the first layer, and non-cooperation game is used in the second layer. Meanwhile RB and power levels stand for the actions that are associated with each player in the game. The problem of resource allocation algorithm is formulated as a mixed integer programming problem. In order to minimize the complexity of the proposed algorithm, the resource allocation task is decomposed into two sub problems: a RB allocation and a power allocation. The simulation results are compared with the traditional methods, the analysis illustrates the proposed algorithm has a better performance regarding SINR and energy efficiency of the heterogeneous network.

    相关文章 | 多维度评价
    20. Improved RB-HARQ scheme based on structured LDPC codes
    王文君;林粤伟;闫渊
    Acta Metallurgica Sinica(English letters)    2007, 14 (4): 100-103.   DOI: 1005-8885 (2007) 04-0100-04
    摘要2605)      PDF(pc) (139KB)(745)    收藏

    Reliability-based hybrid automatic repeat request (ARQ) (RB-HARQ) is a recently introduced approach to incremental-redundancy ARQ. In RB-HARQ scheme, the bits that are to be retransmitted are adaptively selected at the receiver based on the estimated bit reliability. It could result in significant performance gain but requires huge overhead in the feedback channel. In this study, an improved RB-HARQ scheme (IRB-HARQ) for structured low-density parity-check codes is proposed, which simplifies the comparison operations needed to search the bits to be retransmitted and outperforms the RB-HARQ scheme in consideration of the bit transmission power for the requesting messages on the feedback link. Simulation results show that the IRB-HARQ scheme is more efficient and practical than the RB-HARQ scheme.

    参考文献 | 相关文章 | 多维度评价